CVE-2004-0010
CVSS7.2
发布时间 :2004-03-03 00:00:00
修订时间 :2010-08-21 00:19:26
NMCOS    

[原文]Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.


[CNNVD]Linux Kernel NCPFS ncp_lookup()未明本地权限提升漏洞(CNNVD-200403-022)

        
        Linux是一款开放源代码操作系统。
        Linux内核支持的NCPFS存在安全问题,本地攻击者可以利用这个漏洞提升权限。
        ncpfs只用于允许系统挂接NetWare服务卷或打印到NetWare打印服务器操作,其包含的ncp_looup()函数存在问题,可导致权限提升问题。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.4.1Linux Kernel 2.4.1
cpe:/o:linux:linux_kernel:2.4.17Linux Kernel 2.4.17
cpe:/o:linux:linux_kernel:2.4.14Linux Kernel 2.4.14
cpe:/o:linux:linux_kernel:2.4.10Linux Kernel 2.4.10
cpe:/o:linux:linux_kernel:2.4.18:pre5Linux Kernel 2.4.18 pre5
cpe:/o:linux:linux_kernel:2.4.0:test3Linux Kernel 2.4.0 test3
cpe:/o:linux:linux_kernel:2.4.23:pre9Linux Kernel 2.4.23 pre9
cpe:/o:linux:linux_kernel:2.4.0:test7Linux Kernel 2.4.0 test7
cpe:/o:linux:linux_kernel:2.4.19:pre6Linux Kernel 2.4.19 pre6
cpe:/o:linux:linux_kernel:2.4.21:pre1Linux Kernel 2.4.21 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre3Linux Kernel 2.4.18 pre3
cpe:/o:linux:linux_kernel:2.4.5Linux Kernel 2.4.5
cpe:/o:linux:linux_kernel:2.4.19:pre2Linux Kernel 2.4.19 pre2
cpe:/o:linux:linux_kernel:2.4.12Linux Kernel 2.4.12
cpe:/o:linux:linux_kernel:2.4.18::x86
cpe:/o:linux:linux_kernel:2.4.0:test8Linux Kernel 2.4.0 test8
cpe:/o:linux:linux_kernel:2.4.0:test9Linux Kernel 2.4.0 test9
cpe:/o:linux:linux_kernel:2.4.18:pre7Linux Kernel 2.4.18 pre7
cpe:/o:linux:linux_kernel:2.4.19:pre3Linux Kernel 2.4.19 pre3
cpe:/o:linux:linux_kernel:2.4.2Linux Kernel 2.4.2
cpe:/o:linux:linux_kernel:2.4.3Linux Kernel 2.4.3
cpe:/o:linux:linux_kernel:2.4.0:test11Linux Kernel 2.4.0 test11
cpe:/o:linux:linux_kernel:2.4.16Linux Kernel 2.4.16
cpe:/o:linux:linux_kernel:2.4.6Linux Kernel 2.4.6
cpe:/o:linux:linux_kernel:2.4.0:test10Linux Kernel 2.4.0 test10
cpe:/o:linux:linux_kernel:2.4.23Linux Kernel 2.4.23
cpe:/o:linux:linux_kernel:2.4.24Linux Kernel 2.4.24
cpe:/o:linux:linux_kernel:2.4.7Linux Kernel 2.4.7
cpe:/o:linux:linux_kernel:2.4.0:test1Linux Kernel 2.4.0 test1
cpe:/o:linux:linux_kernel:2.4.18:pre4Linux Kernel 2.4.18 pre4
cpe:/o:linux:linux_kernel:2.4.11Linux Kernel 2.4.11
cpe:/o:linux:linux_kernel:2.4.4Linux Kernel 2.4.4
cpe:/o:linux:linux_kernel:2.4.13Linux Kernel 2.4.13
cpe:/o:linux:linux_kernel:2.4.0:test12Linux Kernel 2.4.0 test12
cpe:/o:linux:linux_kernel:2.4.18:pre8Linux Kernel 2.4.18 pre8
cpe:/o:linux:linux_kernel:2.4.0:test2Linux Kernel 2.4.0 test2
cpe:/o:linux:linux_kernel:2.4.19Linux Kernel 2.4.19
cpe:/o:linux:linux_kernel:2.4.18:pre1Linux Kernel 2.4.18 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre6Linux Kernel 2.4.18 pre6
cpe:/o:linux:linux_kernel:2.4.9Linux Kernel 2.4.9
cpe:/o:linux:linux_kernel:2.4.21:pre4Linux Kernel 2.4.21 pre4
cpe:/o:linux:linux_kernel:2.4.8Linux Kernel 2.4.8
cpe:/o:linux:linux_kernel:2.4.18Linux Kernel 2.4.18
cpe:/o:linux:linux_kernel:2.4.19:pre4Linux Kernel 2.4.19 pre4
cpe:/o:linux:linux_kernel:2.4.20Linux Kernel 2.4.20
cpe:/o:linux:linux_kernel:2.4.0:test4Linux Kernel 2.4.0 test4
cpe:/o:linux:linux_kernel:2.4.0:test5Linux Kernel 2.4.0 test5
cpe:/o:linux:linux_kernel:2.4.21:pre7Linux Kernel 2.4.21 pre7
cpe:/o:linux:linux_kernel:2.4.19:pre1Linux Kernel 2.4.19 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre2Linux Kernel 2.4.18 pre2
cpe:/o:linux:linux_kernel:2.4.22Linux Kernel 2.4.22
cpe:/o:linux:linux_kernel:2.4.19:pre5Linux Kernel 2.4.19 pre5
cpe:/o:linux:linux_kernel:2.4.21Linux Kernel 2.4.21
cpe:/o:linux:linux_kernel:2.4.0:test6Linux Kernel 2.4.0 test6
cpe:/o:linux:linux_kernel:2.4.15Linux Kernel 2.4.15
cpe:/o:linux:linux_kernel:2.4.0Linux Kernel 2.4.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:835Red Hat Kernel ncp_lookup Function BO
oval:org.mitre.oval:def:11388Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
oval:org.mitre.oval:def:1035Red Hat Enterprise 3 Kernel ncp_lookup Function BO
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0010
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0010
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-022
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/9691
(VENDOR_ADVISORY)  BID  9691
http://www.redhat.com/support/errata/RHSA-2004-069.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:069
http://www.debian.org/security/2004/dsa-479
(VENDOR_ADVISORY)  DEBIAN  DSA-479
http://xforce.iss.net/xforce/xfdb/15250
(VENDOR_ADVISORY)  XF  linux-ncplookup-gain-privileges(15250)
http://www.redhat.com/support/errata/RHSA-2004-188.html
(UNKNOWN)  REDHAT  RHSA-2004:188
http://www.redhat.com/support/errata/RHSA-2004-065.html
(UNKNOWN)  REDHAT  RHSA-2004:065
http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html
(UNKNOWN)  SUSE  SuSE-SA:2004:005
http://www.debian.org/security/2004/dsa-495
(UNKNOWN)  DEBIAN  DSA-495
http://www.debian.org/security/2004/dsa-491
(UNKNOWN)  DEBIAN  DSA-491
http://www.debian.org/security/2004/dsa-489
(UNKNOWN)  DEBIAN  DSA-489
http://www.debian.org/security/2004/dsa-482
(UNKNOWN)  DEBIAN  DSA-482
http://www.debian.org/security/2004/dsa-481
(UNKNOWN)  DEBIAN  DSA-481
http://www.debian.org/security/2004/dsa-480
(UNKNOWN)  DEBIAN  DSA-480
http://www.securityfocus.com/advisories/6759
(UNKNOWN)  TURBO  TLSA-2004-05
http://www.mandriva.com/security/advisories?name=MDKSA-2004:015
(UNKNOWN)  MANDRAKE  MDKSA-2004:015
http://www.ciac.org/ciac/bulletins/o-082.shtml
(UNKNOWN)  CIAC  O-082
http://fedoranews.org/updates/FEDORA-2004-079.shtml
(UNKNOWN)  FEDORA  FEDORA-2004-079
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820
(UNKNOWN)  CONECTIVA  CLA-2004:820

- 漏洞信息

Linux Kernel NCPFS ncp_lookup()未明本地权限提升漏洞
高危 未知
2004-03-03 00:00:00 2005-10-20 00:00:00
本地  
        
        Linux是一款开放源代码操作系统。
        Linux内核支持的NCPFS存在安全问题,本地攻击者可以利用这个漏洞提升权限。
        ncpfs只用于允许系统挂接NetWare服务卷或打印到NetWare打印服务器操作,其包含的ncp_looup()函数存在问题,可导致权限提升问题。
        

- 公告与补丁

        厂商补丁:
        Conectiva
        ---------
        Conectiva已经为此发布了一个安全公告(CLA-2004:820)以及相应补丁:
        CLA-2004:820:kernel
        链接:
        http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000820

        补丁下载:
        Linux kernel 2.4.19:
        Conectiva Upgrade devfsd-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/devfsd-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-BOOT-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-BOOT-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-doc-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-doc-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-headers-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-headers-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-rbc-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-rbc-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i386.rpm
        Conectiva Upgrade kernel-2.4.19-1U80_21cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i586.rpm
        Conectiva Upgrade kernel-2.4.19-1U80_21cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_21cl.i686.rpm
        Conectiva Upgrade kernel-enterprise-2.4.19-1U80_21cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-enterprise-2.4.19-1U80_21cl.i686.rpm
        Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i586.rpm
        Conectiva Upgrade kernel-smp-2.4.19-1U80_21cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_21cl.i686.rpm
        Linux kernel 2.4.21:
        Conectiva Upgrade devfsd-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/devfsd-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i586.rpm
        Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.i686.rpm
        Conectiva Upgrade kernel24-BOOT-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-BOOT-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-doc-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-doc-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.i686.rpm
        Conectiva Upgrade kernel24-headers-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-headers-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-rbc-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-rbc-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i386.rpm
        Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i586.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i586.rpm
        Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.i686.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.i686.rpm
        Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.athlon.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.athlon.rpm
        Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.athlon.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.athlon.rpm
        Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.athlon.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.athlon.rpm
        Conectiva Upgrade kernel24-2.4.21-31301U90_15cl.pentium4.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_15cl.pentium4.rpm
        Conectiva Upgrade kernel24-enterprise-2.4.21-31301U90_15cl.pentium4.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_15cl.pentium4.rpm
        Conectiva Upgrade kernel24-smp-2.4.21-31301U90_15cl.pentium4.rpm
        ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_15cl.pentium4.rpm
        MandrakeSoft
        ------------
        MandrakeSoft已经

- 漏洞信息

3992
Linux kernel ncpfs Privilege Escalation

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-02-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel NCPFS ncp_lookup() Unspecified Local Privilege Escalation Vulnerability
Unknown 9691
No Yes
2004-02-18 12:00:00 2009-07-12 03:06:00
The disclosure of this issue has been credited to Arjan van de Ven.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
SGI ProPack 2.4
Linux kernel 2.4.24
Linux kernel 2.4.23 -pre9
Linux kernel 2.4.23
+ Trustix Secure Linux 2.0
Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.5
+ Devil-Linux Devil-Linux 1.0.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Red Hat Fedora Core1
+ Slackware Linux 9.1
Linux kernel 2.4.21 pre7
Linux kernel 2.4.21 pre4
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Linux kernel 2.4.21 pre1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ SuSE SUSE Linux Enterprise Server 8
Linux kernel 2.4.20
+ CRUX CRUX Linux 1.0
+ Gentoo Linux 1.4
+ Gentoo Linux 1.2
+ RedHat Linux 9.0 i386
+ Slackware Linux 9.0
+ WOLK WOLK 4.4 s
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux 8.1
+ Slackware Linux -current
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
+ Debian Linux 3.0 ia-32
Linux kernel 2.4.18
+ Astaro Security Linux 2.0 23
+ Astaro Security Linux 2.0 16
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Linux 8.0
+ RedHat Linux 7.3
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 7.3
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Linux Office Server
+ S.u.S.E. Linux Openexchange Server
+ S.u.S.E. Linux Personal 8.2
+ S.u.S.E. SuSE eMail Server 3.1
+ S.u.S.E. SuSE eMail Server III
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Linux kernel 2.4.17
Linux kernel 2.4.16
+ Sun Cobalt RaQ 550
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.11
Linux kernel 2.4.10
+ S.u.S.E. Linux 7.3
Linux kernel 2.4.9
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
Linux kernel 2.4.8
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.7
+ RedHat Linux 7.2
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
Linux kernel 2.4.6
Linux kernel 2.4.5
+ Slackware Linux 8.0
Linux kernel 2.4.4
+ S.u.S.E. Linux 7.2
Linux kernel 2.4.3
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.2
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
Linux kernel 2.4.1
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4

- 漏洞讨论

It has been reported that NCPFS (supported in the Linux Kernel) is prone to an unspecified local privilege escalation vulnerability that allow for a local user to gain elevated privileges. Exploitation of this vulnerability may result in a compromise of root access by local attackers.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Turbolinux has released a security announcement (TLSA-2004-05-21) providing fixes that can be applied to x86 architecture based computers. Turbolinux users are advised to employ the turboupdate, turbopkg, and zabom utilities as a Superuser in order to obtain and apply appropriate fixes. Please see the referenced advisory for further details regarding obtaining and applying fixes.

Mandrake has released an advisory (MDKSA-2004:015) with fixes to address some of the issues described in this BID. Please see the referenced advisory for more information.

Red Hat has released advisories RHSA-2004:065-01 and RHSA-2004:069-06 to address this and other issues. Please see the referenced advisory for more information.

Red Hat has released an advisory FEDORA-2004-079 to address this and other issues. Please see the referenced advisory for more information.

SuSE has released advisory SA:2004:005 dealing with this issue. Please see the referenced advisory for more information.

Conectiva has released advisory CLA-2004:820 dealing with this issue. Please see the referenced advisory for more information.

Mandrake has released an updated advisory MDKSA-2004:015-1 to address this and other issues. Please see the referenced advisory for more information.

SGI has released an advisory 20040204-01-U to address this and other issues in SGI ProPack 2.4. Please see the referenced advisory for more information.

Fedora has released legacy advisory update FLSA:1284 fixing this issue in Red Hat linux 7.2, 7.3 and 8.0 for the i386, i586, i686 and athlon architectures. Please see the referenced advisory for details.

Debian has released advisories DSA 479-1 and DSA 482-1 as well as fixes dealing with this and other issues. Please see the attached advisory for more information and details on obtaining fixes.

Debian has released an update to the advisory DSA 479-1 providing fixes that deal with the IA-32 architecture. Apparently the original fixes are broken due to a build error. Please see the attached advisory for more information and details on obtaining updated fixes.

Debian has released advisory DSA 489-1 to provide updates for Linux 2.4.17 for the PowerPC/apus and S/390 architectures. Please see the attached advisory for details on applying and obtaining fixes.

Debian has released advisory DSA 491-1 to provide updates for Linux 2.4.19 on the MIPS architecture. Please see the attached advisory for details on applying and obtaining fixes.

Debian has released an advisory (DSA 495-1) to address various issues in the Linux kernel. This advisory contains fixes for the ARM architecture. Please see the referenced advisory for more information.

Red Hat has released advisory RHSA-2004:188-14 dealing with this and other issues for their enterprise linux distribution. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.


SGI ProPack 2.4

Linux kernel 2.4.16

Linux kernel 2.4.17

Linux kernel 2.4.18

Linux kernel 2.4.19

Linux kernel 2.4.20

Linux kernel 2.4.21

Linux kernel 2.4.5

Linux kernel 2.4.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站